Business & Information Systems Engineering最新文献

筛选
英文 中文
Open Science 开放科学
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-03-05 DOI: 10.1007/s12599-024-00858-7
Alexander Maedche, Edona Elshan, Hartmut Höhle, Christiane Lehrer, Jan Recker, Ali Sunyaev, Benjamin Sturm, Oliver Werth
{"title":"Open Science","authors":"Alexander Maedche, Edona Elshan, Hartmut Höhle, Christiane Lehrer, Jan Recker, Ali Sunyaev, Benjamin Sturm, Oliver Werth","doi":"10.1007/s12599-024-00858-7","DOIUrl":"https://doi.org/10.1007/s12599-024-00858-7","url":null,"abstract":"","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"71 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140037505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Seamless Mobility-as-a-Service 实现无缝移动即服务
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-02-19 DOI: 10.1007/s12599-024-00856-9
Alexandra Hoess, Jonathan Lautenschlager, Johannes Sedlmeir, Gilbert Fridgen, Vincent Schlatt, Nils Urbach
{"title":"Toward Seamless Mobility-as-a-Service","authors":"Alexandra Hoess, Jonathan Lautenschlager, Johannes Sedlmeir, Gilbert Fridgen, Vincent Schlatt, Nils Urbach","doi":"10.1007/s12599-024-00856-9","DOIUrl":"https://doi.org/10.1007/s12599-024-00856-9","url":null,"abstract":"<p>With growing awareness of sustainability and convenience expectations, customers are increasingly demanding integrated and seamless mobility in the form of mobility-as-a-service (MaaS). However, as centralized MaaS platforms have thus far failed to integrate a critical share of mobility service providers (MSPs), travelers lack opportunities to efficiently combine the various mobility services required for seamless end-to-end itinerary coverage. Particularly, MSPs often refuse to collaborate by devolving control over customer interfaces or sensitive data owing to threats of market power concentration. While alternative blockchain-based approaches aim to provide equal market access, they cannot sufficiently align competing business goals and face substantial problems resulting from the replicated processing of sensitive data. Both researchers and practitioners have recently suggested decentralized digital identity management enabled by digital wallets as a promising mechanism to exchange verifiable identity attributes while mitigating problems related to data aggregation. Following a design science research approach, the article accordingly explores how digital wallets can address the shortcomings of existing approaches to MaaS. It contributes a novel IS architecture and principles for a design at the nexus of centralized and decentralized solutions to mitigate tensions between cooperation and competition. Further, the findings indicate that when building decentralized solutions, one should also consider components beyond blockchain and smart contracts.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"6 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139923080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hedonic Signals in Crowdfunding 众筹中的对价信号
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-02-12 DOI: 10.1007/s12599-024-00854-x
Ivo Blohm, Moritz Schulz, Jan Marco Leimeister
{"title":"Hedonic Signals in Crowdfunding","authors":"Ivo Blohm, Moritz Schulz, Jan Marco Leimeister","doi":"10.1007/s12599-024-00854-x","DOIUrl":"https://doi.org/10.1007/s12599-024-00854-x","url":null,"abstract":"<p>This study draws on signaling theory to investigate the effect of hedonic signals in crowdfunding projects on funding performance. It compares the effect of hedonic signals across reward-, equity-, and donation-based crowdfunding platforms by combining archival data from 18 platforms and a large-scale panel of 64 experts that rate the strength of hedonic signals in 108 crowdfunding projects. Through the application of mixed linear modeling, the findings indicate a positive influence of stronger hedonic signals on funding performance. However, there are substantial differences across platform types. Increasing the strength of hedonic signals by one standard deviation increases funding performance by 28.9% on reward platforms, while there are no systematic effects on equity and donation platforms. This study contributes to existing crowdfunding research by clarifying the role of hedonic signals in crowdfunding and shedding light on the increasing need to better consider the characteristics of different crowdfunding platforms in crowdfunding research.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"48 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139753700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Game-based Learning Artefacts for Cybersecurity Processes Using Action Design Research 利用行动设计研究为网络安全流程设计基于游戏的学习工件
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-02-12 DOI: 10.1007/s12599-024-00852-z
Dixon Prem Daniel Rajendran, Rangaraja P. Sundarraj
{"title":"Designing Game-based Learning Artefacts for Cybersecurity Processes Using Action Design Research","authors":"Dixon Prem Daniel Rajendran, Rangaraja P. Sundarraj","doi":"10.1007/s12599-024-00852-z","DOIUrl":"https://doi.org/10.1007/s12599-024-00852-z","url":null,"abstract":"<p>Cybersecurity threats faced by organizations are growing in volume and sophistication, with human issues being a significant reason underlying these threats. Organizations report the need for skills development to face these challenges. This need is addressed in this study by developing game-based learning (GBL) artefacts for process-related cybersecurity issues. The artefacts are developed using ADR (Action Design Research). These artefacts employ procedures prescribed by NIST (National Institute of Standards and Technology) and CCMP (Cyber Crisis Management Plan) to teach users cybersecurity concepts such as cyber crisis management, malware incident forensics, incident handling and password management. The paper details the artefacts and design process, highlights the implications for practitioners and academicians in GBL, and also describes a nascent theory for Design Science Research (DSR).</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"51 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139753970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Expert-Validated Bridging Model for IoT Process Mining 经专家验证的物联网流程挖掘桥接模型
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-02-08 DOI: 10.1007/s12599-023-00849-0
{"title":"An Expert-Validated Bridging Model for IoT Process Mining","authors":"","doi":"10.1007/s12599-023-00849-0","DOIUrl":"https://doi.org/10.1007/s12599-023-00849-0","url":null,"abstract":"<h3>Abstract</h3> <p>Contextualization is an important challenge in process mining. While Internet of Things (IoT) devices are collecting increasing amounts of data on the physical context in which business processes are executed, the IoT and process mining fields are still considerably disintegrated. Important concepts such as <em>event</em> or <em>context</em> are not understood in the same way, which causes confusion and hinders cooperation between the two domains. Accordingly, in the paper, a consolidated model to bridge the conceptualization gap between the IoT and process mining fields, based on IoT ontologies and business process context models, is presented. This consolidation based on an initial model was obtained after an extensive validation both with an expert panel and with case studies. The results of the expert survey show that the model properly describes the links between the IoT and process mining and that it has added value for IoT process mining. Furthermore, the model was refined according to the experts’ feedback. Accordingly, the paper’s key contribution consists of a common reference model that can instigate true interdisciplinary research connecting IoT and process mining.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"11 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139753791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Putting the SWORD to the Test: Finding Workarounds with Process Mining 测试 SWORD:利用流程挖掘寻找变通方法
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-01-29 DOI: 10.1007/s12599-023-00846-3
Wouter van der Waal, Inge van de Weerd, Iris Beerepoot, Xixi Lu, Teus Kappen, Saskia Haitjema, Hajo A. Reijers
{"title":"Putting the SWORD to the Test: Finding Workarounds with Process Mining","authors":"Wouter van der Waal, Inge van de Weerd, Iris Beerepoot, Xixi Lu, Teus Kappen, Saskia Haitjema, Hajo A. Reijers","doi":"10.1007/s12599-023-00846-3","DOIUrl":"https://doi.org/10.1007/s12599-023-00846-3","url":null,"abstract":"<p>Workarounds, or deviations from standardized operating procedures, can indicate discrepancies between theory and practice in work processes. Traditionally, observations and interviews have been used to identify workarounds, but these methods can be time-consuming and may not capture all workarounds. The paper presents the Semi-automated WORkaround Detection (SWORD) framework, which leverages event log traces to help process analysts identify workarounds. The framework is evaluated in a multiple-case study of two hospital departments. The results of the study indicate that with SWORD we were able to identify 11 unique workaround types, with limited knowledge about the actual processes. The framework thus supports the discovery of workarounds while minimizing the dependence on domain knowledge, which limits the time investment required by domain experts. The findings highlight the importance of leveraging technology to improve the detection of workarounds and to support process improvement efforts in organizations.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"2 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foundation Models 基础模型
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-01-29 DOI: 10.1007/s12599-024-00851-0
Johannes Schneider, Christian Meske, Pauline Kuss
{"title":"Foundation Models","authors":"Johannes Schneider, Christian Meske, Pauline Kuss","doi":"10.1007/s12599-024-00851-0","DOIUrl":"https://doi.org/10.1007/s12599-024-00851-0","url":null,"abstract":"","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"167 2","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating BPMN Extensions for Continuous Processes Based on Use Cases and Expert Interviews 基于用例和专家访谈评估用于持续流程的 BPMN 扩展
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-01-29 DOI: 10.1007/s12599-023-00850-7
Diana Strutzenberger, Juergen Mangler, Stefanie Rinderle-Ma
{"title":"Evaluating BPMN Extensions for Continuous Processes Based on Use Cases and Expert Interviews","authors":"Diana Strutzenberger, Juergen Mangler, Stefanie Rinderle-Ma","doi":"10.1007/s12599-023-00850-7","DOIUrl":"https://doi.org/10.1007/s12599-023-00850-7","url":null,"abstract":"<p>The majority of (business) processes described in literature are discrete, i.e., they result in an identifiable and distinct outcome such as a settled customer claim or a produced part. However, there also exists a plethora of processes in process and control engineering that are continuous, i.e., processes that require real-time control systems with constant inlet and outlet flows as well as temporally stable conditions. Examples comprise chemical synthesis and combustion processes. Despite their prevalence and relevance a standard method for modeling continuous processes with BPMN is missing. Hence, the paper provides BPMN modeling extensions for continuous processes enabling an exact definition of the parameters and loop conditions as well as a mapping to executable processes. The BPMN modeling extensions are evaluated based on selected use cases from process and control engineering and interviews with experts from three groups, i.e., process engineers and two groups of process modelers, one with experience in industrial processes and one without. The results from the expert interviews are intended to identify (i) the key characteristics for the representation of continuous processes, (ii) how experts evaluate the current usability and comprehensibility of BPMN for continuous processes, and (iii) potential improvements can be identified regarding the introduced BPMN modeling extensions.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"153 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Twin Transformation Butterfly 双胞胎变身蝴蝶
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-01-23 DOI: 10.1007/s12599-023-00847-2
{"title":"The Twin Transformation Butterfly","authors":"","doi":"10.1007/s12599-023-00847-2","DOIUrl":"https://doi.org/10.1007/s12599-023-00847-2","url":null,"abstract":"<h3>Abstract</h3> <p>Complex digitalization and sustainability challenges shape today’s management agendas. To date, the dedication of Information Systems research to both challenges has not been equal in terms of effort and reward. Building capabilities to leverage the synergetic potential of digital and sustainability transformation may enhance organizational performance and imply new value creation for the common good. To uncover such synergetic potential, this work conceptualizes the “twin transformation” construct as a value-adding reinforcing interplay between digital transformation and sustainability transformation efforts that improve an organization by leveraging digital technologies to enable sustainability and to guide digital progress by leveraging sustainability. The twin transformation conceptualization is complemented with a capability framework for twin transformation drawing from dynamic capability theory. This work contributes to descriptive knowledge of the interplay between digital transformation and sustainability transformation, setting a foundation for further theorizing on twin transformation and enabling organizations to twin transform.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"24 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Behavior Mining 用户行为挖掘
IF 7.9 3区 管理学
Business & Information Systems Engineering Pub Date : 2024-01-05 DOI: 10.1007/s12599-023-00848-1
Jana-Rebecca Rehse, Luka Abb, Gregor Berg, Carsten Bormann, Timotheus Kampik, Christian Warmuth
{"title":"User Behavior Mining","authors":"Jana-Rebecca Rehse, Luka Abb, Gregor Berg, Carsten Bormann, Timotheus Kampik, Christian Warmuth","doi":"10.1007/s12599-023-00848-1","DOIUrl":"https://doi.org/10.1007/s12599-023-00848-1","url":null,"abstract":"<p>Studying the behavior of users in software systems has become an essential task for software vendors who want to mitigate usability problems and identify automation potentials, or for researchers who want to test behavioral theories. One approach to studying user behavior in a data-driven way is through the analysis of so-called user interaction (UI) logs, which record the low-level activities that a user performs while executing a task. In the paper, the authors refer to the analysis of UI logs as User Behavior Mining (UBM) and position it as a research topic. UBM is conceptualized by means of a four-component framework that elaborates how UBM data can be captured, which technologies can be applied to analyze it, which objectives UBM can accomplish, and how theories can guide the analytical process. The applicability of the framework is demonstrated by three exemplary applications from an ongoing research project with a partner company. Finally, the paper discusses practical challenges to UBM and derives an agenda for potential future research directions.</p>","PeriodicalId":55296,"journal":{"name":"Business & Information Systems Engineering","volume":"11 1","pages":""},"PeriodicalIF":7.9,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139102378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信